Why Small Businesses Need a Malware Sandbox ? – Top 3 Reasons in 2023
26
Oct
2023

Malware Sandbox For Small Business

Running a small business can often lead to the misconception that cyber-security is not a priority due to the company’s…

Security Response & Free Monitoring
26
Oct
2023

Security Response & Free Monitoring

CCleaner, the popular system optimization software, has been identified as one of the victims of the MOVEit hack. As a…

The Red Evil hacker group
26
Oct
2023

Red Evil Hacker Group Targets Lebanon, Warns Of Cyberattack

Amid the ongoing Israel-Palestine conflict, the pro-Israeli hacker collective ‘The Red Evil’ has issued a threat aimed at Lebanon, specifically…

Exploring the Evolving Identity Security Landscape
26
Oct
2023

Exploring the Evolving Identity Security Landscape – Partner Content

In today’s digital landscape, where enterprises are increasingly investing in digital transformation and migrating to the cloud, identity security is…

26
Oct
2023

Quishing: Tricks to look out for

QR code phishing – aka “quishing” – is on the rise, according to HP, Darktrace, Malwarebytes, AusCERT, and many others….

ASD takes cyber offensive to
26
Oct
2023

ASD takes cyber offensive to “tens” of targets in the last year – Security

The Australian Signals Directorate has run as many as 50 offensive cyber security actions in the past year. Director-general Rachel…

Snatch Ransomware Group Claims The FDVA Cyber Attack
26
Oct
2023

12 Million Redcliffe Labs Records With PII Found Exposed

A significant data breach was uncovered at Redcliffe Labs, a leading Indian diagnostic service provider, where over 12 million healthcare…

How To Locate Your BitLocker Recovery Key And Initiate BitLocker
26
Oct
2023

How To Locate Your BitLocker Recovery Key And Initiate BitLocker

A BitLocker recovery key is a unique 48-character alphanumeric code generated when you enable BitLocker to drive encryption on a…

Hackers launches a chain of exploits Via Malicious iMessage Attachments
26
Oct
2023

Hackers launches a chain of exploits Via Malicious iMessage

In June, a new campaign targeting iPhone and iPad devices was named “TriangleDB.” This malware infection chain consists of a…

Pwn2Own Toronto 2023
26
Oct
2023

Akira Stealer: An Undetected Python-Based Info-stealer

Akira is an information stealer malware that was found in March 2023. This malware can steal sensitive information, including saved…

Update vCenter Server now! VMWare fixes critical vulnerability
26
Oct
2023

Update vCenter Server now! VMWare fixes critical vulnerability

VMWare has issued an update to address out-of-bounds write and information disclosure vulnerabilities in its server management software, vCenter Server….

Fortive Cyberattack
26
Oct
2023

Fortive Cyberattack: BlackBasta’s Latest Victim

The infamous BlackBasta ransomware group has allegedly expanded its list of victims to include Fortive, a global industrial technology company…